Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3M3ctNW03Zy1mN3Fj

Authorization bypass in github.com/dgrijalva/jwt-go

jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1

Permalink: https://github.com/advisories/GHSA-w73w-5m7g-f7qc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXc3M3ctNW03Zy1mN3Fj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: 8 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-w73w-5m7g-f7qc, CVE-2020-26160
References: Repository: https://github.com/dgrijalva/jwt-go
Blast Radius: 37.5

Affected Packages

go:github.com/dgrijalva/jwt-go/v4
Dependent packages: 538
Dependent repositories: 1,672
Downloads:
Affected Version Ranges: < 4.0.0-preview1
Fixed in: 4.0.0-preview1
All affected versions:
All unaffected versions:
go:github.com/dgrijalva/jwt-go
Dependent packages: 18,699
Dependent repositories: 98,905
Downloads:
Affected Version Ranges: <= 3.2.0
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.0.2, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.6.0, 2.7.0, 3.0.0, 3.1.0, 3.2.0